远程视频监控系统大学毕业论文外文文献翻译及原文

合集下载

外文参考文献翻译-中文

外文参考文献翻译-中文

外⽂参考⽂献翻译-中⽂基于4G LTE技术的⾼速铁路移动通信系统KS Solanki教授,Kratika ChouhanUjjain⼯程学院,印度Madhya Pradesh的Ujjain摘要:随着时间发展,⾼速铁路(HSR)要求可靠的,安全的列车运⾏和乘客通信。

为了实现这个⽬标,HSR的系统需要更⾼的带宽和更短的响应时间,⽽且HSR的旧技术需要进⾏发展,开发新技术,改进现有的架构和控制成本。

为了满⾜这⼀要求,HSR采⽤了GSM的演进GSM-R技术,但它并不能满⾜客户的需求。

因此采⽤了新技术LTE-R,它提供了更⾼的带宽,并且在⾼速下提供了更⾼的客户满意度。

本⽂介绍了LTE-R,给出GSM-R与LTE-R之间的⽐较结果,并描述了在⾼速下哪种铁路移动通信系统更好。

关键词:⾼速铁路,LTE,GSM,通信和信令系统⼀介绍⾼速铁路需要提⾼对移动通信系统的要求。

随着这种改进,其⽹络架构和硬件设备必须适应⾼达500公⾥/⼩时的列车速度。

HSR还需要快速切换功能。

因此,为了解决这些问题,HSR 需要⼀种名为LTE-R的新技术,基于LTE-R的HSR提供⾼数据传输速率,更⾼带宽和低延迟。

LTE-R能够处理⽇益增长的业务量,确保乘客安全并提供实时多媒体信息。

随着列车速度的不断提⾼,可靠的宽带通信系统对于⾼铁移动通信⾄关重要。

HSR的应⽤服务质量(QOS)测量,包括如数据速率,误码率(BER)和传输延迟。

为了实现HSR的运营需求,需要⼀个能够与 LTE保持⼀致的能⼒的新系统,提供新的业务,但仍能够与GSM-R长时间共存。

HSR系统选择合适的⽆线通信系统时,需要考虑性能,服务,属性,频段和⼯业⽀持等问题。

4G LTE系统与第三代(3G)系统相⽐,它具有简单的扁平架构,⾼数据速率和低延迟。

在LTE的性能和成熟度⽔平上,LTE- railway(LTE-R)将可能成为下⼀代HSR通信系统。

⼆ LTE-R系统描述考虑LTE-R的频率和频谱使⽤,对为⾼速铁路(HSR)通信提供更⾼效的数据传输⾮常重要。

视频监控系统外文翻译译

视频监控系统外文翻译译

视频监控系统外文翻译译中文3630字毕业设计外文翻译2014 届信息科学与工程学院通信工程专业题目:子题:外文文献Video surveillance system is safe guard system is an important part of a preventive ability strong comprehensive system. Video monitoring with its convenient, intuitive and information content rich and widely used in many occasions. In recent years, with the development of modern science and technology, in particular network bandwidth, computer processing power and storage capacity rapidly increase and various practical video information processing technology, video surveillance technology also appeared a considerable development, video monitoring entered the digital network age, increasingly attention by people and attention. The development of video surveillance system is mainly early analog closed-circuit television monitoring system combined to video monitoring system model of digital video monitor and now the evolution process, and the system of digital video monitor system now according to the technical development and divided into three stages: digital monitor multimedia stage, digital monitor DVR stage and digital monitor network stage.1, video monitoring system simulations simulate video monitoring system is divided into microprocessor-based video switch control plus PC multimedia management and pc-based realize the switch control of matrix host and system multimedia management two types. Analog closed-circuit television monitoring system is actually the combination of many simulation monitoring equipment, system mainly consists of "front-end device" and "terminal control device" and "signal transmission medium" three parts, including: front-end equipment is mainly a camera, haeundae, decoder, control equipment is mainly a switching matrix, image segmentation device, monitor and control the keyboard, video, etc. Transmission medium including cable, control, etc. As microprocessors, the function, performance of microcomputers and heighten, multimedia technology application, the system in functionality,performance, reliability, structure pattern, etc, great changes have happened to the video monitoring system, more convenient, thecomposition of the interface with other technical system tends to regulate, man-machine interface more friendly. But because video monitor and control system in the flow of information form does not change, the video signal is still simulation system, the network structure is mainly a ChanGongNeng, one-way, lumped way of information collection network,so system although has developed to a high level, has not much potential can dig, its limitations still exist, to meet the higher request,digital is the only way. Simulation monitoring system of main faults are: a, usually only suitable for small range of regional monitor videosignal transmission, simulation tools, and is mainly coaxial cable to transmit analog video signal coaxial cable, the distance is not more than the distance twisted-pair dump more short, this determines the analog monitor only suitable for single building, small neighborhood and other small range of places. B, the system of expansion ability difference for has already built good system, if want to add new monitory point, often is one change makes all change, new equipment is also hard to add to the original system in. C, unable to form effective alarm linkage, because each part between independent operation, the control protocol is difficult to each other, linkage in the limited scope only.2 video monitoring system, digital multimedia technology, video with compression technology, network communication technology of digital video surveillance system development, the rapid rise, on the market today there are two types of digital video monitor system type, one is the digital video equipment video monitoring system for the core, another kind is embedded video Web server video monitoring system for the core.Digital video compression technology matures, the computer based on PC universalization, create conditions multimedia monitor. This new video monitoring system of rapid rise, partially replaced with video matrix image segmentation device, video as the core, complementary with other transmitter simulation video monitor mode, its advantage mainly displays in: a, PC multimedia monitor video matrix, the host integratedimage segmentation device, many functions of video recorders, simplifies the structure of the system. B, because use the computer network technology, digital multimedia remote network monitor from distance limit. C, due to the large capacity disk array inventory device or CD storage, can save you a lot of tape medium, and it is helpful to the multimedia information system.But as the PC video surveillance video system development, in actual engineering in use process, also exposed some shortage, mainly system work instability. The video surveillance video based on PC for: the structure of system compatible/industrial PC + video capture card + ordinary/more reliable operation platform + application software. From the system composition structure to analysis: a, PC for 24 hour uninterrupted job, its performance is not very stable, g-kong PCrelative compatible PC's stability have a class enhancement, suitablefor complex working environment. B, operating system: with Windows 98for operation platform system, the industry insiders know, there are certain Win98 stability problem, if at the same time the application software is not very standardized, it'll be easier in use process appears work instability, freezes and other issues, and PC video surveillance video system realization of their software in Windows 95/98 / NT, Unix, Linux operating system, such as general while system files, application software and image files are stored in the disk, video processing must high-density input of large quantities of data, and to work hard drive, the average for the hard disk logic (such as Windows,already can't adapt to FAT32) so susceptible, causing instability crashed phenomenon. C,application software: the simple application software system is not can be used for security video monitoring system, fields of application software ability should support multitasking concurrent processing, such as monitoring, video, playback, backup, alarm, control, remote connection, etc. The ability to deal with more work D, video capture card: video surveillance video system for road input system are usually video capture card, can use multiple CARDS way, also can use single card mode. Say commonly, a single card way better integration high stability will more than all the way, many using card has a card way very easy to form hardware conflicts, its stability will have a major influence. Embedded system is used as the center, software and hardware can be cut, to adapt application system function, reliability and cost, volume etc comprehensive demanding special computer system for monitoring system, i.e. the special computer system tailored.Embedded system mainly consists of embedded processor, relevant support hardware, embedded operating system and application software system etc, it is the collection software and hardware in theintegration of can work independently "devices". Embedded operating system is a kind of real-time, supports embedded system application operating system software, it is embedded system extremely important constituent, usually includes and hardware related software drivers, system kernel bottom, device driver interface, communication protocol,graphic interface, standardization browsers, embedded real-time operating system in the related hardware and efficiency of dependence, software application and specificity solid state has more prominent characteristics. The advantages and disadvantages of embedded system, the system for a special system, so the system is small, instruction downsizing and processing speed. B, system data in ROM/FLASH with fast speed, call, not be altered, good stability. C, system treatment of good real-time performance, stable performance. D, document management system ismore suitable for large amounts of video data. E, in network function, audio and video sync issues may also difficult satisfactory. Embedded video Web server mode, a built-in video server embedded Web server, the embedded real-time multitasking operating system. The video signal digital camera sent by high compression chip after through internal bus to compress, built-in Web server, Internet users can use directly on the Web server browsers on camera images, subscribers can also control the camera lens, haeundae, the actions or operate on system configuration.Because the video compression and Web function centralism to a small size within the equipment can be directly connected lans, achieve namely that look, omited inserted range of complex cable, convenientinstallation (only set an IP address), the user does not need to install any hardware device, with the browser can only watch. Embedded video Web server monitoring system and other surveillance system has the followingcharacteristics: a comparison of embedded video area is vast, have been supervised Web server monitoring system of Web server directly connected network, no cable length and attenuation, and the limit of the conceptof network is no distance, completely abandoned regional concept, expand have been supervised areas. B, the system has almost unlimited seamless expansion ability all equipment is mark, with IP address increased equipment just means that IP address the expansion. C, can form a very complicated monitoring network based on embedded Web server is the core of the monitoring system in network mode, with traditional analogmonitor and based on PC platforms screening method has greatly different, because Web server output has completed analog to digital conversion and compression, adopt uniform agreement on the network transmission,support across the router across the gateway, remote video transmission. D, stable and reliable performance, without staff management embedded Web server based on embedded computertechnology, actually using embedded real-time multitasking operating system, and video compression and Web function due to focus on a small size, within the device directly concatenation LAN or wan, namely that look, system insert real-time, stability, reliability greatly improved, also need not specially assigned management, which is very suitable for unattended conditions. E, when the monitoring center needs to watch a video camera image, more network bandwidth will have certain requirements.The development of video monitoring system1, video monitoring system development directionVideo digitizing, front integration, network, system integration is monitoring the development of video monitoring system, and recognized the direction is the premise of digital network, network and system integration of video monitor based, so, the biggest two characteristics is the digital and network.2, digitalDigital is the 21st century features, is the information technology as the core, the necessity of the development of electronic technology, digital is toward growth pass, along with the time development, our environment will become more and more digital.Video surveillance system is the system of digital first should flow in video, audio, (including from analog state control, etc.) state, which to digital completely break "classic cable TV system based on camera imaging technology as the center" structure, fundamentally changing video monitoring system from information acquisition, data processing, transmission and system control of the mode and structural form. The flow of information digitization, coding compression, open video monitoring system, make agreements with the security system in other between each subsystem realize seamless connection, and theunified operation platform to realize the management and control system integration, this also is the meaning.3 and networkVideo monitoring system of the structure of the network will mean system by lumped type to distribution type system transition.Distribution type system USES the multi-layer hierarchical structureform and the real-time kernel technology with micro multitask, multi-user, distributed operating system to achieve beat task scheduling algorithm fast response. Distributing type monitoring system of the hardware and software using the standardization, the modularization and the serialization of design, system equipment configuration has the versatility, openness, system configuration flexible, control theperfect function, data processing convenient, friendly man-machine interface and system installation, commissioning and maintenancesimplify the operation of the system, are hot backup, fault-tolerant reliable, etc. System in some degree of networked broke on regional and equipment have been supervised extended geographical and quantity limits. System network will make the whole network system hardware and software resources sharing and mission and load of sharing, this also is an important concept of the system integration. From the above can seevideo technology, the development of video, roughly experienced analog video, network video PC in three phases, and depending on the technology of the network, communication and transmission platform.外文翻译视频监控系统是安全防范系统的重要组成部分,是一种防范能力较强的综合系统。

ZigBee外文文献加翻译

ZigBee外文文献加翻译

A Coal Mine Environmental Monitor System with LocalizationFunction Based on ZigBee-Compliant PlatformDongxuan YangCollege of Computer and InformationEngineeringBeijing Technology and BusinessUniversityBeijing, ChinaYan ChenCollege of Computer and InformationEngineeringBeijing Technology and BusinessUniversityBeijing, China*****************Kedong WangCollege of Computer and InformationEngineeringBeijing Technology and BusinessUniversityBeijing, ChinaAbstract—This paper describes and implements a new type of coal mine safety monitoring system, it is a kind of wireless sensor network system based on ZigBee technology. The system consists of two parts underground and surface. Wireless sensor networks are constituted by fixed nodes, mobile nodes and a gateway in underground. PC monitoring software is deployed in the surface. The system can not only gather real-time environmental data for mine, but also calculate the real-time location of mobile nodes worn by miners.Keywords:ZigBee; localization; wireless sensor networks; coal MineI.RESEARCH STATUSAs an important energy, coal plays a pivotal role in the economic development. Coal mine monitoring system, is the important guarantee for coal mine safety and high efficiency production [1]. In order to ensure the safe operation, the installation of environment monitoring node in tunnels to real-time detection is very important. However, commonly used traditional monitoring node wired connection to obtain communication with the control system, this node exist wiring difficulties, expensive and other shortcomings. In contrast, wireless sensor node can be easily with current mine monitoring network connection, and good compatibility, facilitate constituted mine gas monitoring network, to suit various size of mine applications. Since wireless nodes are battery powered, so completely out of the shackles of the cable, shorten the construction period can be arranged at any time where the need to use.The ZigBee wireless communication technology is used in this coal mine environmental monitor system. This is a new short-range, low complexity, low power,low data rate, low-cost two-way wireless communication technology [2]. Now, wireless sensor network product based on ZigBee technology are quantity and variety, but the real product can be applied in underground environments of special sensor node is very few[3]. The sensor node that we designed in the system is truly able to apply to in-well environment, it through the wireless sensor node security certification. At the same time, due to the special nature of the wireless network is that it can spread the wireless signal, we can easily locate staff for coal mine safety monitoring provides more protection [4].II. SYSTEM ARCHITECTUREThis system is a comprehensive monitoring system which is combined with software and hardware. Hardware part includes wireless mobile nodes and fixed nodes which were deployed in the underground tunnel, the main function of them is to collect coal mine environment data and require person’s location. Software part refers to the PC monitoring software which is designed in VC++ is used to summarize and display the data of each node. Monitoring node is divided into mobile nodes and fixed nodes; they are using ZigBee protocol for wireless transmission of data. Because the fixed node is also using wireless data transmission method, so it's deployed in the underground roadway becomes very convenient. As the mobile node is carried by the miner, it must be using wireless transmission method. This allows the mine to form a topology of ZigBee wireless sensor network. The fixed node in wireless sensor network is router device and the mobile node carried by miner is the end device. Normally, the router of ZigBee network has no sensor equipment; it is only responsible for data forwarding. But considering the practical application, we believe that add sensor devices on the router will be better on monitoring underground coal mine environment. So in our design, the router also has an environment monitoring function which is usually designed in end device.Fixed node will sent received data from mobile node to the gateway, then the gateway transmits data to monitor computer through RS232 or optical fiber. The PC monitor software in the computer will process all data and display them in a visualization window. The PC software also calculates each mobile node’s real-time location through the specific localization algorithm, according to the received signal strength (RSSI) obtained from mobile nodes.III. NODE DESIGNSince the ZigBee wireless network platform sold on present market was designed for the general environment, for special underground so they are not suitable for the environment. Therefore, we need to customize the system for underground environment whit a special hardware circuit. Node photo are shown in Fig. 1 Then wireless microcontroller CC2530 chip is the core processor of the node device, it can constitute a ZigBee network with very few peripheral circuits. TheCC2530 is an IEEE 802.15.4 compliant true System-on-Chip, supporting theproprietary 802.15.4 market as well as the ZigBee, ZigBee PRO, and ZigBee RF4CE standards. Unlike other wireless chip, CC2530 built-in 8051 monolithic integrated circuits kernel, therefore we no longer need to use a single MCU to control the circuit, and this save us a lot of cost [5].A.Mobile NodeThe mobile node is the end device of a ZigBee network that can be carried by miner; it should be a portable and low power consumption node. So the mobile node we designed is only as small as a mobile phone, and it is by built-in lithium ion battery power supply. In power loss, the core processor CC2530 is a low power consumption chip, when it is in the sleep mode, it only need to use less then 1uA work current. In order to reduce power consumption as much as possible on the display, a 100*32 pixel matrix with no backlighting LCD screen was used. The battery’s capacity of the mobile node is 1500mAh,so it is enough to meet the miner’s long hour works in the underground. The battery charge management chip is TP4057, the maximum charge current can up to 500Ma.Figure 1. Node photo.The mobile node circuit includes the gas concentration sensor MJ4.0 and temperature sensor PT-1000. As far as we know, many wireless sensor platforms use the digital type sensor. The communication between the digital sensor and the MCU need strict timing requirements. But considering the actual application, the wireless MCU usually has a real-time operating system in general, if we use the microcomputer to simulate the strict timing, it will affect the real-time of whole operating system. These two sensors output analog signals not digital signals. Only input this signal into a differential amplifier, can we get an appropriate signal that can be converted to a digital signal by an ADC mode within the CC2530 chip. In order to facilitate the carrying, external antenna was not used in our mobile node, instead ofusing a 2.4GHz patch antenna. And we customize a shell like a cell phone size; it is enough to put all PCBs, sensors and battery in it. Taking into account the small shell of the explosive performance is not very good, the design of PCBs and the selection of component are all carried out the safety assessment.B. Fixed NodeFixed node is installed in the wall of the underground tunnel. Because it is big than the mobile node, it is not appropriate to carry around. The circuit of the fixed node is almost same with the mobile node, it also use a CC2530 chip as core processor. Because of underground tunnels generally deploy with power cable, fixed nodes can use cable power-supply modes. At the same time, because we use wireless signal transmission, the deployment of new fixed nodes become very convenient, which also resolves the problem of the signal lines deployment.As a fixed node, the minor who is doing work may far from it, in order to facilitate the miners observed environmental data around the fixed nodes, it uses LED digital display. At the same time, the large current LED lights and buzzer are designed in the circuit; it makes the fixed node with the function of sound-light alarm. Considering that it may occur the emergency of without electricity, fixed node also built-in a lithium-ion battery. Under normal conditions, lithium-ion battery is in charging status, when external cable disconnect, fixed node is automatic switched to battery power, which can ensure the mobile node can deliver the information through fixed nodes in underground.Without regarding to fixed nodes’ portability, we have a customized shell that has excellent explosion properties, and the internal space is enough to hold down the 2.4 GHz antenna. To ensure safety, all cables and the location of sensors are placed with particular glue sealed, so that it has a good seal.IV.POSITIONING FUNCTIONOne of the important functions of the wireless sensor networks is localization, especially in the underground tunnel, it relates to the safe of the miner's life. Currently most widely used orientation method is GPS satellite positioning, it is a high precision, all-weather and global multifunctional system with the function of radio navigation, positioning and timing. But the GPS positioning method is not suitable for the underground work environment of coal mine, once you enter the underground, it cannot receive satellite signal, thus unable to achieve targeting [6]. We need to consider how to use wireless network to realize positioning function, means using wireless signal between the communications of devices for positioning. The existing distance measuring technology between the wireless-devices basically is the following kinds of methods: TOA, TDOA, AOA and RSSI.About the TOA method, the distance between the two devices is determined by the product of the speed of light and transmission time [7]. Although the precision of this method is accurate, but it require a precise time synchronization, so it demand hardware is higher.TDOA technology need ultrasonic signal,which is setting on a node with receive and transmit function. When measure the distance, it can sent ultrasonic wave and wireless signals together. By measuring the difference between two signals arrival time, we can calculate the distance between two devices [8]. Using this method can also obtain accurate result, but the method need to increase ultrasonic sending and receiving device on the node circuit, it will increase cost.AOA technology needs to install multiple antennas through the nodes so it canobtain adjacent nodes’ signals on deferent directions [9]. With this it can determine the location information from number of adjacent nodes and calculate its own position. This method not only need to add additional hardware, but also it's still very vulnerable to external disturbance, therefore it's not suitable for utilize.RSSI ranging is a cheap and easy technology. By using this method, we don't need to add additional hardware design. We also do not need very precise time requirements. This technique is about with measuring the wireless signals strength in the propagation of the loss, to measure the distance between two nodes. Because of this method requires hardware equipment is less, algorithm is simple, so it has been using in many wireless communication field. Comprehensive all conditions, positioning on the use of RSSI ranging technique.A. Hardware Location EngineThe CC2431 wireless microcontroller chip produced by TI Company has a hardware location engine. From the software's point of view, CC2431’s hardware location engine has a very simple API interface, as long as writing the necessary parameters and waiting for calculation, it can read the location results [10].The hardware location engine is also based on RSSI technology. The localization system includes reference nodes and blind nodes. The reference node is a fixed node that located in a known position, the node know their place and send a packet notifyto other nodes. The blind node receives packets from reference nodes, which can obtains reference nodes’ location and the corresponding RSSI value and put them into the hardware location engine, and then the blind node’s location can be read from the engine [11].On the surface, using the CC2431 hardware location engine targeting the program as a good choice, but considering the practical application, it will encounter the following problems. First of all, we have choose the CC2530 as the main chip of fixed nodes of the system, its internal programs is running in ZigBee2007 protocol, but CC2431 as a early chip, it applies only to ZigBee2006 protocol. In the communications between CC2431 and CC2530 that will have compatibility problems. Secondly, CC2431 hardware location engine use the distributed computing, all mobile nodes’ location are calculated by themselves, and then they upload information to the gateway node, this will not only occupy the mobile node processing time, still it can take up more network resources. For this reason, we have to shelve this approach, consider how to implement location by using CC2530 chip.B. Software Location EngineIf we want to use CC2530 to implement location function, that we must write software location engine by ourselves. Because that chip do not have a hardware location engine inside of it. This software location engine is still used RSSI technology; meanwhile mobile node position is calculated by the PC software, so asto reduce the burden of mobile node computing. To calculate the mobile node location, there must be at least three reference nodes. We will regard router nodes as reference nodes in network, and record the X, Y coordinates of every reference node. Then we let the mobile node send signal to each reference node, so that each reference node can obtain a RSSI values, with these parameters, we can use trilateral measurement method to calculate the specified location of the mobile node. The simpler way give the mobile node to broadcast way to send data, then around it every router node would receive the data from the mobile node, thus obtains RSSI values. Once the mobile node number increasing network, this method will make router nodes more burden, because the every radio message that the router node receives will transmit from the low layer to the top layer. Finally the application layer will analyze data packets. Infact, the mobile node need not to broadcast transmitted data, other routing node can also receive the mobile node packets. Only child mobile nodes of the router node will continue to transmit the packet forwarding upward, the other router nodes will shield out the packet in the bottom of the protocol.In order to let all router nodes can receive the packet which sending by mobile nodes, and send its RSSI values up to the gateway node, we need to modify the relevant function in Z- Stack protocol which is provided by TI. First we find the function named afIncomingData, it deals with the received data from the bottom of protocol, in which we add some code that can obtain packet’s RSSI value. Then through the osal_set_event function to add and send an eventMY_RSSI_REPORT_EVT of RSSI value task to OSAL polling system. This event’s corresponding function will be executed in the task of OSAL interrupt-driven function, thus the mobile node corresponding RSSI values will be sent to gateway node. Through this method, the packet will only be processed by bottom function of the protocol. According to this method we can obtain corresponding RSSI value and save the computation time of mobile nodes.In fact, this software location engine is not implementing with a single mobile node, but through the operation of the whole system to achieve. By which the mobile node is only responsible for sending unicast packets. The mobile node’s parent router node is responsible to forward the packet to the gateway. Other router nodes are not responsible for forwarding this packet, just clipping the mobile node of RSSI value, then forwarded to the gateway. Finally the gateway bring all RSSI values of the mobile node to PC monitoring software, the corresponding mobile node’s location is calculated. In order to reduce the error, monitoring software will collect 10 times of the RSSI value and take average on it, and then select the nearest value of the three fixed nodes. Finally the trilateral measurement method is used to calculate the location of mobile nodes.V.SYSTEM IMPLEMENTATIONAll software systems embedded in nodes are based on Z-Stack. BecauseZ-Stack is an open-source project, it is very beneficial to the secondary development. These nodes were tested in a real coal mine locate in Shanxi Province. We deployed the fixed node every 50 meters in the tunnel, and also set a fixed node in each entrance of the work area. Because the fixed node have large size digital LED displays, so the display content of the fixed node can be seen far from away the miner. Each miner carries a mobile node, the temperature and gas concentration is displayed on the LCD screen at real-time.The gateway node is placed at the entrance of the mine, through the RS232 cable connected to the monitoring computer in the control room. In this system all packets collected by the gateway node are transmitted to PC through a serial port, and it can save historical data backup to a SQL database. The main function of monitoring software is to display and store the data of every node, and calculates related mobile nodes’ location according to RSSI values. The monitoring software has two main dialog interfaces, one is used to display a two- dimensional profile of the coal mine, and user can see all the miners' working position. Another interface is data displaying interface, and environmental data were shown here. The picture of PC monitoring software is shown in Fig. 2.Figure 2. PC monitoring software.VI.SYSTEM EV ALUATIONThrough repeated testing of the system, we made the system an objective assessment. First is the power consumption assess for node hardware, fixed node’s working voltage is in 9V ~ 24V when the power supplied by cable. The maximum operating current for fixed node is 93mA; the average operating current is 92.2mA. When the power cable was disconnected, fixed node powered by lithium-ion battery. On battery power, the fixed node’s maximum working current is 147mA; average working current is 146.3mA. Fixed nodes can work 8 hours on battery power at least.Another quite important performance is the location function of the system performance. At four different locations of tunnel and working areas, mobile nodes were placed there. Two sets of different average error data were shown in From table 1. Because this system uses RSSI technology and it relies mainly on the signal strength, the signal quality will be affected by interferences. From different locations’ errors we can see that, the error in working areas was larger than it in tunnels, because the tunnel is generally straight, but the shape of the working areas are uncertainty.We gratefully acknowledge Texas Instruments for devices provided to us free of charge. And also thank staffs of XinNuoJin Company for giving us supports onsystem testing.REFERENCES[1] Xinyue Zhong Wancheng Xie. “Wireless sensor network in the coal mineenvironment monitoring“. Coal technology, 2009, Vol. 28, No. 9,pp.102-103. [2] Shouwei Gao. “ZigBee Technology Practice Guide”. Beijing: Beijing Universityof Aeronautics and Astronautics Press , 2009, pp. 27-28.[3] Yang Wang, Liusheng Huang, Wei Yang. “A Novel Real-Time CoalMinerLocalization and Tracking System Based on Self-Organized Sensor Networks”.EURASIP Journal onWireless Communications and Networking, Volume 2010, Article ID 142092.[4] Sang-il Ko, Jong-suk Choi, Byoung-hoon Kim. “Indoor Mobile LocalizationSystem and Stabilization of Localizaion Performance using Pre-filtering”.International Journal of Control, Automation and Systems, Vol. 6, No. 2, pp.204-213, April 2008.[5] .[6] Hawkins Warren, Daku Brian L. F, Prugger Arnfinn F. “Positioning inunderg round mines”. IECON 2006 - 32nd Annual Conference on IEEE Industrial Electronics, 2006, pp. 3159-3163.[7] Zhu, Shouhong, Ding, Zhiguo, Markarian Karina. “TOA based jointsynchronization and localization”. 2010 IEEE International Conference on Communications, ICC 2010, 2010, Article ID 5502036.[8] Ni Hao, Ren Guangliang, Chang Yilin. “A TDOA location scheme in OFDMbased WMANs”. IEEE Transactions on Consumer Electronics,2008, Vol. 54, No. 3, pp. 1017-1021.[9] Dogançay Kutluyil, Hmam Hatem. “Optimal angular sensor separation for AOAlocalization”. Signal Processing, 2008, Vol. 88, No. 5, pp. 1248-1260.[10] K. Aamodt. “CC2431 Location Engine”. Texas Instruments, Application NoteAN042, SWRA095.[11] Tennina Stefano, Di Renzo Marco, Graziosi Fabio, Santucci Fortunato.“Locating zigbee nodes using the tis cc2431 location engine: A testbed platform and new solutions for positioning estimation of wsns in dynamic indoor environments”. Proc Annu Int Conf Mobile Comput Networking, 2008, pp.37-42.摘要-本文介绍并设计了一个新类型的煤矿安全监控系统,它是一种基于ZigBee 技术的无线传感器网络系统。

网络视频会议系统详细英文文献

网络视频会议系统详细英文文献

CONTENTSAbstract 2Abstract 21 Introduction 32, the basic principles of video conferencing systems 43 Video Conferencing System Design and Implementation of 53.1 Introduction 5 Development Environment3.1.1 Java language and development tools Introduction 53.1.2 System Hardware Environment 63.2 The concrete realization of the system 63.2.1 JavaGroups concrete realization of 63.2.2 extension of JavaGroups 9 for video conferencing system3.3 Video Conference System-related technologies 133.3.1 Java Media Framework 133.3.2 CSCW 134 Concluding Remarks 145 Xie resigned 146 References 14AbstractAlways need traditional scheduled meeting time, location, uniform personnel and arranged a meeting venue, record, host, etc., meeting the problems to be solved, or programs to be developed, decision-making is often delayed because a number of objective factors. Video Conferencing (VideoConference) system is a can sounds, images, text and other information sent from one place to another communication system, which solves the above problems, eliminating the many meetings expenditure, reduced problem-solving cycle, so that greatly reduced the influence of objective factors. Video conferencing system as computer technology and communication technology product of the combination, with the whole world is the rise of the information highway has developed rapidly. This paper introduces the basic concepts of video conferencing systems, and associated Java Media Framework (JMF: Java Media Framework) and computer supported cooperative work (CSCW: Computer Supported Cooperative Work) system, Java language and development environment, and in accordance with video conferencing the basic structure and some related technologies, shows a small toolkit based JavaGroups video conferencing system design and implementation. Keywords: video conferencing system; JavaGroups kit; Java Media Framework; Computer supported cooperative workAbstractTraditionally, holding a conference needs some complex procedures for a long time, such as pre-arranging the schedule, place, people, preparingthe hall, recorder, master and so on. The goal of a meeting, resolving problemsor making plans and decisions, will be usually delayed by suchobjective factors. The video conference system is a communication system that transmits many kinds of signals such as video, audio, text and so on from one place to another. It is created to save money and time because of meetings and helps reducing the influence of objective factors. Thevideo conference system is the combination of computer technology and communication technology, and it is now developing very fast with the National Information Infrastructure of the whole world. This article introduces the basic concepts of the video conference, JMF (Java Media Framework) and the CSCW (Computer Supported Coorperative Work) system and Java language . According to the basic structure of video conference and some other technology, it describes the design and implementation of a mini-video conference system based-on JavaGroups toolkit.Key words: video conference system; JavaGroups toolkit; JMF; CSCW1 IntroductionMeeting of human society an integral part of economic life, the study shows that approximately 55% of the effectiveness of communication depends on the face (face-to-face) of the visual effects, 38% rely on talking voice, audio-visual people The most important form of access to information, and face to face discussions (face-to-face) is the most abundant human expression of ideas way. Since the industrial revolution, the technological advancement made a breakthrough progress in communication technology, telephone and telegraph invention of the distant sound of people and documents can be sent immediately. However, in addition to verbal communication, the human beings pay more attention to facial expressions and body expression, only voice transmission has been unable to meet the needs of modern communication, real-time video and interactive delivery of information more real and natural. (1) video conferencing system is in this generation, driven by an urgent need for a new generation of communications products.Video Conferencing (VideoConference) system is a can sounds, images, text and other information sent from one place to another communication system. Effective transmission of video-based information on a remote sector and intersectoral cooperation, and also can be achieved, such as video conferencing and video applications such as video on demand technology. Video conference system is the computer technology and communication technology product of the combination, multimedia communication technology as an important part of being affected with the rise of the global information superhighway and has developed rapidly.Video conferencing has been thirty years from the emergence, from the beginning to reduce travel costs, improve efficiency, to 911 domestic and international collaboration to accelerate the time to protect the personal safety, to safeguard social stability during SARS and the minimum work operation, the advantages of video conferencing is increasingly widely displayed. (2) In viewof the video conference system in the military, economic and cultural fields, the enormous role of the human and economic, national research and development of competing video conferencing systems, especially in very large scale integrated circuits, compression algorithms and visual physiology research breakthrough has been made and on a series of international standards for video conferencing were introduced, and a variety of image processing chips have the introduction of real-time video conferencing systems have come a long way before the practical development. The main application at home and abroad are:Business CommunicationBusiness ConferenceEnterprise customer service and product developmentDistance learning and technical trainingMarket research and intelligence gatheringTelemedicine and consultationCooperation in scientific research and engineering designMultinational applicationStaff recruitmentFrom the current perspective of the development, research on a lot of video conferencing technology, the products are very rich, although very attractive video conferencing system has broad prospects, but in this area there are considerable technical issues to be resolved, video conferencing systems at this stage of practicality, versatility and friendliness of the relevant technologies and related issues: software technology, database technology, network technology, sharing of technology, resource control, security technology and technology conference model. (3)The main research topics is the way of software, with the necessary peripherals to achieve a small video conferencing system.2, the basic principles of video conferencing systemsVideo Conferencing (VideoConference) system is the basic definition: two or more individuals or groups of different geographic location, through the transmission line and multimedia equipment, the sound, image, video, interactive video and file transfer data, to instant and interactive communication in order to complete the purpose of the conference system. Be read from above, video conferencing is a typical multimedia communications, the next diagram is a diagram of a typical video conferencing system:Figure 1.1 A typical schematic of a video conferencing system From the above diagram we can basically tell, the video conferencing system has three main components, namely, communication networks, conferencing terminals and multipoint control unit. Video conferencing systems andcomputer technology is essentially the product of combining communication technology, so the communication network is based video conferencing system component of the terminal session is video, audio, data, signaling, and so a variety of digital signals, respectively after combined into the composite digital stream, and then transforms to a code with the user - Network compatible interface, in line with the provisions of the transmission network of the frame structure of the channel to send the channel signal format for transmission. Multipoint control unit is multi-point video conferencing system, audio-visual information for transmission and switching part, which is based on certain criteria for audio-visual signal processing, and on request allocation of each channel to be connected, but it is not necessary for video conferencing.(1)Communication network is a series of devices, institutions and processes, through them, attached to the end user devices on the network can be a meaningful exchange of information. It relates to the network transport protocol, network programming interfaces and so on. (4)Video conferencing system has undertaken a variety of media terminal device information input, output and processing, and the connection between the user and network, interact and control a number of tasks. It belongs to the user digital communication equipment, in the system at the user's audio, data input / output devices and networks. (1)Sometimes the need for video conferencing between multiple points of information transmission and exchange, then you can control unit by means of multi-point (MCU) to achieve. Multipoint control unit is actually a multimedia information exchange, multi-point call and connection, to achieve video broadcasting, video selection, audio mixing, data broadcasting and other functions, the completion signal of the terminal tandem with the switch. MCU signals sent by the various terminals to separate, extract audio, video, data and signaling, respectively, corresponding to the processing unit, or switch audio mixing, video switching, data broadcasting, routing, session control, timing, and call processing, the processed signal from the multiplexer in accordance with the H.221 format, framing, and then sent to the designated port by the network interface. (5)3 Video Conferencing System Design and ImplementationIntroduction 3.1 Development Environment3.1.1 Java language and development tools IntroductionJava language is an emerging network of today's popular programming language, its object-oriented, cross-platform, distributed applications and so on to the programmer to bring a new computing concept, the WWW from the initial development of simply providing static information to the present provide a variety of dynamic services, has undergone tremendous changes. The emergence of Java has led a revolution in the field of programming, it is known as the 20th century, the most important emerging technologies. Java applets can not only write to achieve the sound embedded in Web pages andanimation capabilities, but also can be used independently of the medium and large applications, its powerful networking capabilities to the entire Internet as a unified operating platform, greatly expanded the traditional stand-alone or Client / Server mode application extension and intension. Since its inception in 1995, officially, Java has gradually advanced from a simple computer programming language developed into a major Internet platform, and thus caused, led the Java industry's development and growth, become the power of the computer industry and can not be ignored important development trends and direction. (6)General said, Java is an excellent, simple, object-oriented, distributed, interpreted, robust, secure, structured, neutral, portable, multithreaded and dynamic language .Java development tools into three categories, namely:text editor.λ These tools only provide text editing functions, it is only a tool similar to Notepad. Such tools, the development of a variety of programming languages, such as C, C + +, Java and so on. There are other editors UltraEdit and EditPlus.Webλ development tools. Such tools provide a Web page editing features, Java is mainly specific to the development of JSP pages. There are HomeSite and so on.integrated developmentλ tools. Such tools provide a Java development environment, inheritance, for those who need to integrate Java and J2EE developers, Web application development team provides program, Servlets, JSPs, EJBs, data access and enterprise applications with strong support. Now many tools of this type, but also the development trend of Java development tools. There are Jbuilder, WebGain, WebSphere Studio and so on.JBuilder is one of the best Java development tool, in the collaborative management of J2EE and XML support, etc. were walking in front of other products.JBuilder's main features are:λ provides Tomcat (Tomcat is a Servlet container for JSP environment. Servlet container is replaced by the user management and call Servlet runtime shell) integration, making it easier for Web developers.λ provides enterprise application development features, you can integrate multiple application servers.λ provide a more simple procedure publishing, all applications can be packaged.λ provides team development capabilities, to integrate a variety of version control products.JBuilder J2EE standard is to follow the Sun, a visual integrated development tools. It is a market-leading cross-platform environment, mainly for building industrial-strength enterprise Java with due process. Borland JBuilder company inherited the excellent characteristics of the development tools, which makes used Delphi, C + + Builder programmers easily transition to theJBuilder development environment. (7)The system used in Java development tools JBuilder9.3.1.2 System Hardware EnvironmentCPU: P4 1.70G Memory: 256MB HDD: 40GBOperating System: Microsoft Windows2000 Professional3.2 The concrete realization of the system3.2.1 JavaGroups concrete realization ofThe system is based JavaGroups to analyze and design. JavaGroups Cornell University is developing a Java-based toolkit, which provides a reliable group communication. Its function includes all members of the group to send messages, and to ensure that each member receives the same sequence of messages. Its basic concept is similar to the one socket BDS Channel: Users can give their wish to join the group name and then connect, send and receive messages and find all the current members to join, and when members join or leave can be notified. All channels can be of the same name each "discovered", and messages sent through a channel can be the same group (with the same name) receive all the channels. (8)JavaGroups folder contains 12 folders and 31 java files and put them together to generate a project file JBuilder9. The file is 12 packets and 31 Java Java files. These packages are: blocks, conf, debug, demos, ensemble, log, persistence, protocols, service, stack, tests, and util. This article discusses the four main types of package main functions:service package:Abstract class AbstractService: all servers implement a superset of the class, each server has two communication channels: one is the internal server to the legitimate group members and communication, and the other group was used for client-server communication.Class ServiceRunner: to start the server in standalone mode.class: ServiceRunnerpublic static method:(1) main (String args []) and Resourcename under args.length to determine whether the boot server.(2) startService (ResourceBundle res) extracted from the specialization of the resource parameters, create a server instance and start it.Private static method: printUsage () prints the role of this class.Public static field:(1) CLIENT_CHANNEL_STACK customer communications channel protocol stack.(2) CLIENT_GROUP_NAME customer communications channel group name.(3) SERVICE_CHANNEL_STACK server communication channel protocol stack.(4) SERVICE_GROUP_NAME server communication channel of the group name.Interface lease: describes a lease manager by enabling the label to allow for a limited time access to some resources.Interface: leasePublic method:(1) getExpiration () to obtain lease expiration time, the lease expiration time is always an absolute value.(2) getDuration () Check whether the lease expires.(3) getLeaseTarget () to obtain loan on behalf of the object and returns a unique identifier loan source.(4) getTenant () for the lessee of the lease and return the entity to obtain a unique lease identifier.(5) getFactory () for creating an instance of the leased LeaseFactory Interface LeaseFactory: responsible for approving the new lease, update and delete does not require the existing lease rental.Class LeaseFactoryClient: an implementation of the interface LeaseFactory, it represents one or more instances of the group LeaseFactotyService the loan is approved.Class LeaseFactoryService: is the ability to lease resources for users of the server. Lease request by the user - server communication channel given by the message headers in the presence of LeaseRequestHeader identify. In each message may have only one loan request, which contains the lease period and the entity requesting the information rent, the information payload payload includes a unique identifier for loan resources.Class LeaseRequestHeader: Header subclass represents the loan request. Class LeaseResponseHeader: Header subclass represents the response from the server, the existence of this header in the message that a previous request was successful. header type determines what type of request to meet.stack package:Class AckMcastReceiverWindow: to create and maintain an information stack, accept different information sent by the sender. Answer each message received, check whether it has been rejected, if it is, then discard the message, or reject it. Information includes the need to delete old information, serial number, they are removed from the information table.Class AckMcastSenderWindow: for each piece of information to maintain a stack, saving the recipient sent ack.Class AckSenderWindow: a sender ack-based sliding window, when receiving a ack, the message will be filled according to the order of sequence number added to the window, also delete response message.Class Configurator: to set up and configure the protocol stack, not the one used to describe the hierarchical level and configuration to create and configure a string passed to the configuration of the stack, and then return to the top of a parameter.Class GossipServer: for each member of the address lease to maintain abuffer, it has two basic functions: access to the members of a given group and for a given set up a new member.Class GossipClient: is a local stub, a private-based TCP protocol to connect to GossipServer.Class GossipData: Package GossipServer and data sent between GossipClient.Class Interval: 管理resend interval.Class IpAddress: depends on the network address, the UDP protocol stack generated the lowest level, contains a network address and port.Abstract class Protocol: the protocol layer provides a set of public servers. Each layer must be a subclass of protocol and override some methods (such as the typical up, down and getname). The order of each layer to be stacked together to form a stack.Class MessageProtocol: Protocol of the sub-class, which is based on the agreement, but the merged RequestCorrelator and GroupRequest, which is used to send messages to all members and accept their response.Class ProtocolStack: Protocol subclass, ProtocolStack manage many agreements, it creates all the protocol classes, initialize them, and when ready, to the lowest level of agreement started them. It also received the from the stack of information for distribution to the registered objects, such as channel, GMP, and the information sent to these objects to send down the stack down. ProtocolStack use Configurator to create and initialize the stack, and when they are destroyed when no longer needed the stack.Class NakReceiverWindow: the serial number according to the information maintained stack. Information is not allowed in order to add,And the serial number of lines can be a gap.Interface ProtocolObserver: setting for the debugger interface to receive notification about a protocol layer. Defines a hook, a major event occurs when they are called by the protocol, for example, an event is received. Each ProtocolObserver must have a reference for its monitoring of the agreement. Class Retransmitter: maintenance of a need to re-send the message sequence number pool, the information is marked with time, resend the request based on time priority.Class StateTransferInfo: contains the state transition parameters between the channel and STATE_TRANSFER conversion.tests Package: usedλ to test each module.λ util package: Java.util package includes the Java language, the use of some low-level tool, the util package in its basis a number of improvements to make it more suitable for the actual system. If one class LinkedListQueue, is built on top of the java.util.Queue, if you want to use this class instead of the original class, it can rename Queue.java and compile,1 前言会议,是人类社会经济生活中不可或缺的一部分,有关的研究表明,通信的有效性约55%依赖于面对面(face-to-face)的视觉效果,38%依赖于说话语音,视听是人们获取信息的最重要形式,而面对面的讨论(face-to-face)是人类表达思想最丰富的一种方式。

测控专业 毕业论文 外文翻译 中英文对照

测控专业 毕业论文 外文翻译 中英文对照

Oscillation, Instability and Control of Stepper Motors LIYU CAO and HOWARD M. SCHWARTZDepartment of Systems and Computer Engineering, Carleton University, 1125 Colonel By Drive,Ottawa, ON K1S 5B6, Canada(Received: 18 February 1998; accepted: 1 December 1998)AbstractA novel approach to analyzing instability in permanent-magnet stepper motors is presented. It is shown that there are two kinds of unstable phenomena in this kind of motor: mid-frequency oscillation and high-frequency instability. Nonlinear bifurcation theory is used to illustrate the relationship between local instability and mid frequency oscillatory motion. A novel analysis is presented to analyze the loss of synchronism phenomenon, which is identified as high-frequency instability. The concepts of separators and attractors in phase-space are used to derive a quantity to evaluate the high-frequency instability. By using this quantity one can easily estimate the stability for high supply frequencies. Furthermore, a stabilization method is presented. A generalized approach to analyze the stabilization problem based on feedback theory is given. It is shown that the mid-frequency stability and the high-frequency stability can be improved by state feedback.Keywords: Stepper motors, instability, nonlinearity, state feedback.1. IntroductionStepper motors are electromagnetic incremental-motion devices which convert digital pulse inputs to analog angle outputs. Their inherent stepping ability allows for accurate position control without feedback. That is, they can track any step position in open-loop mode, consequently no feedback is needed to implement position control. Stepper motors deliver higher peak torque per unit weight than DC motors; in addition, they are brushless machines and therefore require less maintenance. All of these properties have made stepper motors a very attractive selection in many position and speed control systems, such as in computer hard disk drivers and printers, XY-tables, robot manipulators, etc.Although stepper motors have many salient properties, they suffer from an oscillation or unstable phenomenon. This phenomenon severely restricts their open-loop dynamic performance and applicable area where high speed operation is needed. The oscillation usually occurs at stepping rates lower than 1000 pulse/s, and has been recognized as a mid-frequency instability or local instability , or a dynamic instability . In addition, there is another kind of unstable phenomenon in stepper motors, that is, the motors usually lose synchronism at higher stepping rates, even though load torque is less than their pull-out torque. This phenomenon is identified as high-frequency instability in this paper, because it appears at much higher frequencies than the frequencies at which the mid-frequency oscillation occurs. The high-frequency instability has not been recognized as widely as mid-frequency instability, and there is not yet a method to evaluate it.Mid-frequency oscillation has been recognized widely for a very long time, however, acomplete understanding of it has not been well established. This can be attributed to the nonlinearity that dominates the oscillation phenomenon and is quite difficult to deal with.Most researchers have analyzed it based on a linearized model . Although in many cases, this kind of treatments is valid or useful, a treatment based on nonlinear theory is needed in order to give a better description on this complex phenomenon. For example, based on a linearized model one can only see that the motors turn to be locally unstable at some supply frequencies, which does not give much insight into the observed oscillatory phenomenon. In fact, the oscillation cannot be assessed unless one uses nonlinear theory.Therefore, it is significant to use developed mathematical theory on nonlinear dynamics to handle the oscillation or instability. It is worth noting that Taft and Gauthier , and Taft and Harned used mathematical concepts such as limit cycles and separatrices in the analysis of oscillatory and unstable phenomena, and obtained some very instructive insights into the so-called loss of synchronous phenomenon. Nevertheless, there is still a lack of a comprehensive mathematical analysis in this kind of studies. In this paper a novel mathematical analysis is developed to analyze the oscillations and instability in stepper motors.The first part of this paper discusses the stability analysis of stepper motors. It is shown that the mid-frequency oscillation can be characterized as a bifurcation phenomenon (Hopf bifurcation) of nonlinear systems. One of contributions of this paper is to relate the mid-frequency oscillation to Hopf bifurcation, thereby, the existence of the oscillation is proved theoretically by Hopf theory. High-frequency instability is also discussed in detail, and a novel quantity is introduced to evaluate high-frequency stability. This quantity is very easy to calculate, and can be used as a criteria to predict the onset of the high-frequency instability. Experimental results on a real motor show the efficiency of this analytical tool.The second part of this paper discusses stabilizing control of stepper motors through feedback. Several authors have shown that by modulating the supply frequency , the mid-frequency instability can be improved. In particular, Pickup and Russell have presented a detailed analysis on the frequency modulation method. In their analysis, Jacobi series was used to solve a ordinary differential equation, and a set of nonlinear algebraic equations had to be solved numerically. In addition, their analysis is undertaken for a two-phase motor, and therefore, their conclusions cannot applied directly to our situation, where a three-phase motor will be considered. Here, we give a more elegant analysis for stabilizing stepper motors, where no complex mathematical manipulation is needed. In this analysis, a d–q model of stepper motors is used. Because two-phase motors and three-phase motors have the same q–d model and therefore, the analysis is valid for both two-phase and three-phase motors. Up to date, it is only recognized that the modulation method is needed to suppress the mid-frequency oscillation. In this paper, it is shown that this method is not only valid to improve mid-frequency stability, but also effective to improve high-frequency stability.2. Dynamic Model of Stepper MotorsThe stepper motor considered in this paper consists of a salient stator with two-phase or three-phase windings, and a permanent-magnet rotor. A simplified schematic of athree-phase motor with one pole-pair is shown in Figure 1. The stepper motor is usually fed by a voltage-source inverter, which is controlled by a sequence of pulses and produces square-wave voltages. This motor operates essentially on the same principle as that of synchronous motors. One of major operating manner for stepper motors is that supplying voltage is kept constant and frequency of pulses is changed at a very wide range. Under this operating condition, oscillation and instability problems usually arise.Figure 1. Schematic model of a three-phase stepper motor.A mathematical model for a three-phase stepper motor is established using q–d frame-reference transformation. The voltage equations for three-phase windings are given byva = Ria + L*dia /dt − M*dib/dt − M*dic/dt + dλpma/dt ,vb = Rib + L*dib/dt − M*dia/dt − M*dic/dt + dλpmb/dt ,vc = Ric + L*dic/dt − M*dia/dt − M*dib/dt + dλpmc/dt ,where R and L are the resistance and inductance of the phase windings, and M is the mutual inductance between the phase windings. _pma, _pmb and _pmc are the flux-linkages of the phases due to the permanent magnet, and can be assumed to be sinusoid functions of rotor position _ as followλpma = λ1 sin(Nθ),λpmb = λ1 sin(Nθ − 2 /3),λpmc = λ1 sin(Nθ - 2 /3),where N is number of rotor teeth. The nonlinearity emphasized in this paper is represented by the above equations, that is, the flux-linkages are nonlinear functions of the rotor position.By using the q; d transformation, the frame of reference is changed from the fixed phase axes to the axes moving with the rotor (refer to Figure 2). Transformation matrix from the a; b; c frame to the q; d frame is given byFor example, voltages in the q; d reference are given byIn the a; b; c reference, only two variables are independent (ia C ib C ic D 0); therefore, the above transformation from three variables to two variables is allowable. Applying the above transformation to the voltage equations (1), the transferred voltage equation in the q;d frame can be obtained asvq = Riq + L1*diq/dt + NL1idω + Nλ1ω,vd=Rid + L1*did/dt − NL1iqω,Figure 2. a, b, c and d, q reference frame.where L1 D L CM, and ! is the speed of the rotor.It can be shown that the motor’s t orque has the following formT = 3/2Nλ1iqThe equation of motion of the rotor is written asJ*dω/dt = 3/2*Nλ1iq − Bfω – Tl ,where Bf is the coefficient of viscous friction, and Tl represents load torque, which is assumed to be a constant in this paper.In order to constitute the complete state equation of the motor, we need another state variable that represents the position of the rotor. For this purpose the so called load angle _ [8] is usually used, which satisfies the following equationDδ/dt = ω−ω0 ,where !0 is steady-state speed of the motor. Equations (5), (7), and (8) constitute the statespace model of the motor, for which the input variables are the voltages vq and vd. As mentioned before, stepper motors are fed by an inverter, whose output voltages are not sinusoidal but instead are square waves. However, because the non-sinusoidal voltages do not change the oscillation feature and instability very much if compared to the sinusoidal case (as will be shown in Section 3, the oscillation is due to the nonlinearity of the motor), for the purposes of this paper we can assume the supply voltages are sinusoidal. Under this assumption, we can get vq and vd as followsvq = Vmcos(Nδ) ,vd = Vmsin(Nδ) ,where Vm is the maximum of the sine wave. With the above equation, we have changed the input voltages from a function of time to a function of state, and in this way we can represent the dynamics of the motor by a autonomous system, as shown below. This will simplify the mathematical analysis.From Equations (5), (7), and (8), the state-space model of the motor can be written in a matrix form as followsẊ = F(X,u) = AX + Fn(X) + Bu , (10) where X D Tiq id ! _UT , u D T!1 TlUT is defined as the input, and !1 D N!0 is the supply frequency. The input matrix B is defined byThe matrix A is the linear part of F._/, and is given byFn.X/ represents the nonlinear part of F._/, and is given byThe input term u is independent of time, and therefore Equation (10) is autonomous.There are three parameters in F.X;u/, they are the supply frequency !1, the supply voltage magnitude Vm and the load torque Tl . These parameters govern the behaviour of the stepper motor. In practice, stepper motors are usually driven in such a way that the supply frequency !1 is changed by the command pulse to control the motor’s spee d, while the supply voltage is kept constant. Therefore, we shall investigate the effect of parameter !1.3. Bifurcation and Mid-Frequency OscillationBy setting ! D !0, the equilibria of Equation (10) are given asand ' is its phase angle defined byφ= arctan(ω1L1/R) . (16) Equations (12) and (13) indicate that multiple equilibria exist, which means that these equilibria can never be globally stable. One can see that there are two groups of equilibria as shown in Equations (12) and (13). The first group represented by Equation (12) corresponds to the real operating conditions of the motor. The second group represented by Equation (13) is always unstable and does not relate to the real operating conditions. In the following, we will concentrate on the equilibria represented by Equation (12).翻译译文步进电机的振荡、不稳定以及控制摘要本文介绍了一种分析永磁步进电机不稳定性的新颖方法。

智能控制系统毕业论文中英文资料对照外文翻译文献

智能控制系统毕业论文中英文资料对照外文翻译文献

智能控制系统中英文资料对照外文翻译文献附录一:外文摘要The development and application of Intelligence controlsystemModern electronic products change rapidly is increasingly profound impact on people's lives, to people's life and working way to bring more convenience to our daily lives, all aspects of electronic products in the shadow, single chip as one of the most important applications, in many ways it has the inestimable role. Intelligent control is a single chip, intelligent control of applications and prospects are very broad, the use of modern technology tools to develop an intelligent, relatively complete functional software to achieve intelligent control system has become an imminent task. Especially in today with MCU based intelligent control technology in the era, to establish their own practical control system has a far-reaching significance so well on the subject later more fully understanding of SCM are of great help to.The so-called intelligent monitoring technology is that:" the automatic analysis and processing of the information of the monitored device". If the monitored object as one's field of vision, and intelligent monitoring equipment can be regarded as the human brain. Intelligent monitoring with the aid of computer data processing capacity of the powerful, to get information in the mass data to carry on the analysis, some filtering of irrelevant information, only provide some key information. Intelligent control to digital, intelligent basis, timely detection system in the abnormal condition, and can be the fastest and best way to sound the alarm and provide usefulinformation, which can more effectively assist the security personnel to deal with the crisis, and minimize the damage and loss, it has great practical significance, some risk homework, or artificial unable to complete the operation, can be used to realize intelligent device, which solves a lot of artificial can not solve the problem, I think, with the development of the society, intelligent load in all aspects of social life play an important reuse.Single chip microcomputer as the core of control and monitoring systems, the system structure, design thought, design method and the traditional control system has essential distinction. In the traditional control or monitoring system, control or monitoring parameters of circuit, through the mechanical device directly to the monitored parameters to regulate and control, in the single-chip microcomputer as the core of the control system, the control parameters and controlled parameters are not directly change, but the control parameter is transformed into a digital signal input to the microcontroller, the microcontroller according to its output signal to control the controlled object, as intelligent load monitoring test, is the use of single-chip I / O port output signal of relay control, then the load to control or monitor, thus similar to any one single chip control system structure, often simplified to input part, an output part and an electronic control unit ( ECU )Intelligent monitoring system design principle function as follows: the power supply module is 0~220V AC voltage into a0 ~ 5V DC low voltage, as each module to provide normal working voltage, another set of ADC module work limit voltage of 5V, if the input voltage is greater than 5V, it can not work normally ( but the design is provided for the load voltage in the 0~ 5V, so it will not be considered ), at the same time transformer on load current is sampled on the accused, the load current into a voltage signal, and then through the current - voltage conversion, and passes through the bridge rectification into stable voltage value, will realize the load the current value is converted to a single chip can handle0 ~ 5V voltage value, then the D2diode cutoff, power supply module only plays the role of power supply. Signal to the analog-to-digital conversion module, through quantization, coding, the analog voltage value into8bits of the digital voltage value, repeatedly to the analog voltage16AD conversion, and the16the digital voltage value and, to calculate the average value, the average value through a data bus to send AT89C51P0, accepted AT89C51 read, AT89C51will read the digital signal and software setting load normal working voltage reference range [VMIN, VMAX] compared with the reference voltage range, if not consistent, then the P1.0 output low level, close the relay, cut off the load on the fault source, to stop its sampling, while P1.1 output high level fault light, i.e., P1.3 output low level, namely normal lights. The relay is disconnected after about 2minutes, theAT89C51P1.0outputs high level ( software design), automatic closing relay, then to load the current regular sampling, AD conversion, to accept the AT89C51read, comparison, if consistent, then the P1.1 output low level, namely fault lights out, while P1.3 output high level, i.e. normal lamp ( software set ); if you are still inconsistent, then the need to manually switch S1toss to" repair" the slip, disconnect the relay control, load adjusting the resistance value is: the load detection and repair, and then close the S1repeatedly to the load current sampling, until the normal lamp bright, repeated this process, constantly on the load testing to ensure the load problems timely repair, make it work.In the intelligent load monitoring system, using the monolithic integrated circuit to the load ( voltage too high or too small ) intelligent detection and control, is achieved by controlling the relay and transformer sampling to achieve, in fact direct control of single-chip is the working state of the relay and the alarm circuit working state, the system should achieve technical features of this thesis are as follows (1) according to the load current changes to control relays, the control parameter is the load current, is the control parameter is the relay switch on-off and led the state; (2) the set current reference voltage range ( load normal working voltage range ), by AT89C51 chip the design of the software section, provide a basis for comparison; (3) the use of single-chip microcomputer to control the light-emitting diode to display the current state of change ( normal / fault / repair ); specific summary: Transformer on load current is sampled, a current / voltage converter, filter, regulator, through the analog-digital conversion, to accept the AT89C51chip to read, AT89C51 to read data is compared with the reference voltage, if normal, the normal light, the output port P.0high level, the relay is closed, is provided to the load voltage fault light; otherwise, P1.0 output low level, The disconnecting relay to disconnect the load, the voltage on the sampling, stop. Two minutes after closing relay, timing sampling.System through the expansion of improved, can be used for temperature alarm circuit, alarm circuit, traffic monitoring, can also be used to monitor a system works, in the intelligent high-speed development today, the use of modern technology tools, the development of an intelligent, function relatively complete software to realize intelligent control system, has become an imminent task, establish their own practical control system has a far-reaching significance. Micro controller in the industry design and application, no industry like intelligent automation and control field develop so fast. Since China and the Asian region the main manufacturing plant intelligence to improve the degree of automation, new technology to improve efficiency, have important influence on the product cost. Although the centralized control can be improved in any particular manufacturing process of the overall visual, but not for those response and processingdelay caused by fault of some key application.Intelligent control technology as computer technology is an important technology, widely used in industrial control, intelligent control, instrument, household appliances, electronic toys and other fields, it has small, multiple functions, low price, convenient use, the advantages of a flexible system design. Therefore, more and more engineering staff of all ages, so this graduate design is of great significance to the design of various things, I have great interest in design, this has brought me a lot of things, let me from unsuspectingly to have a clear train of thought, since both design something, I will be there a how to design thinking, this is very important, I think this job will give me a lot of valuable things.中文翻译:智能控制系统的开发应用现代社会电子产品日新月异正在越来越深远的影响着人们的生活,给人们的生活和工作方式带来越来越大的方便,我们的日常生活各个方面都有电子产品的影子,单片机作为其中一个最重要的应用,在很多方面都有着不可估量的作用。

视频监控系统外文文献翻译、中英文翻译

视频监控系统外文文献翻译、中英文翻译

附录一外文译文视频监控系统是安全防范系统的重要组成部分,是一种防范能力较强的综合系统。

视频监控以其直观、方便、信息内容丰富而广泛应用于许多场合。

近年来,随着现代科学技术的不断发展特别是网络带宽、计算机处理能力和存储容量的迅速提高一级各种实用视频信息处理技术的出现,视频监控技术也有长足的发展,视频监控进入了全数字化的网络时代,日益受到人们的重视和关注。

视频监控系统的发展基本上是从早期的模拟闭路电视监控系统向数模结合的视频监控系统和现在的数字视频监控系统演变的过程,而现在的数字视频监控系统根据技术的发展又分为三个阶段:数字监控的多媒体阶段、数字监控的DVR阶段和数字监控的网络阶段。

1.模拟视频监控系统:模拟视频监控系统分为基于微处理器的视频切换控制加PC 机的多媒体管理和基于PC机实现对矩阵主机的切换控制及对系统的多媒体管理两种类型。

模拟闭路电视监控系统实际上就是许多模拟监控设备的组合,系统主要由“前端设备”和“终端控制设备”以及“信号传输介质”三个部分组成,其中:前端设备主要由摄像机、云台、解码器等,控制设备主要由切换矩阵、画面分割器、监视器、控制键盘、录像机等、传输介质包括电缆、控制线等。

随着微处理器、微机的功能、性能、可靠性、结构方式等方面都发生了很大的变化,视频监控系统的构成更加方便灵活、与其它技术系统的接口趋于规范,人机交互界面更为友好。

但由于视频监控系统中信息流的形态没有变,仍为模拟的视频信号,系统的网络结构主要是一种单功能、单向、集总方式的信息采集网络,因此系统尽管已发展到很高的水平,已无太多潜力可挖,其局限性依然存在,要满足更高的要求,数字化是必经之路。

模拟监控系统的主要缺点有:通常只适合于小范围的区域监控,模拟视频信号的传输工具主要是同轴电缆,而同轴电缆传输模拟信号的距离不大于1Km,双绞线的距离更短,这就决定了模拟监控只适合于单个大楼、小的居民区以及其他小范围的场所。

系统的扩展能力差。

外文文献和翻译

外文文献和翻译

本科生毕业设计(论文)外文文献翻译译文题目:基于MCGS的交通灯控制系统的设计学生姓名:刘家兴学号: 201207013120院系:机械与控制工程学院专业年级: 2012级自动化专业指导教师:张晓玲2016年 4 月20 日Design of traffic light control system based on MCGS Abstract:One kind of traffic light control system using programmable logic controller (PLC), via software control traffic lights run automatically. In the system,the original line is the program instead of the relay, programmable logic controller (PLC) system hardware and software resources to be fair use. Normal operation and emergency transport for a detailed description and from the East and West emergencies can be mutually linked. Traffic signal systems and two seven-segment digital display in the countdown order;also discussed in detail the wiring of the hardware and PLC ladder. Traffic lights at the crossroads of the remote monitoring system design configuration software MCGS,real-time monitoring of traffic lights, greatly improving the reliability of data transmission. At the same time,we can configure the traffic lights to change the status of photographs。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

毕业设计(论文)外文文献翻译文献、资料中文题目:远程视频监控系统文献、资料英文题目:文献、资料来源:文献、资料发表(出版)日期:院(部):专业:电子信息工程班级:姓名:学号:指导教师:翻译日期: 2017.02.14外文文献翻译A System for Remote Video Surveillanceand MonitoringThe thrust of CMU research under the DARPA Video Surveillance and Monitoring (VSAM) project is cooperative multi-sensor surveillance to support battlefield awareness. Under our VSAM Integrated Feasibility Demonstration (IFD) contract, we have developed automated video understanding technology that enables a single human operator to monitor activities over a complex area using a distributed network of active video sensors. The goal is to automatically collect and disseminate real-time information from the battlefield to improve the situational awareness of commanders and staff. Other military and federal law enforcement applications include providing perimeter security for troops, monitoring peace treaties or refugee movements from unmanned air vehicles, providing security for embassies or airports, and staking out suspected drug or terrorist hide-outs by collecting time-stamped pictures of everyone entering and exiting the building.Automated video surveillance is an important research area in the commercial sector as well. Technology has reached a stage where mounting cameras to capture video imagery is cheap, but finding available human resources to sit and watch that imagery is expensive. Surveillance cameras are already prevalent in commercial establishments, with camera output being recorded to tapes that are either rewrittenperiodically or stored in video archives. After a crime occurs – a store is robbed or a car is stolen – investigators can go back after the fact to see what happened, but of course by then it is too late. What is needed is continuous 24-hour monitoring and analysis of video surveillance data to alert security officers to a burglary in progress, or to a suspicious individual loitering in the parking lot, while options are still open for avoiding the crime.Keeping track of people, vehicles, and their interactions in an urban or battlefield environment is a difficult task. The role of VSAM video understanding technology in achieving this goal is to automatically “parse” people a nd vehicles from raw video, determine their geolocations, and insert them into dynamic scene visualization. We have developed robust routines for detecting and tracking moving objects. Detected objects are classified into semantic categories such as human, human group, car, and truck using shape and color analysis, and these labels are used to improve tracking using temporal consistency constraints. Further classification of human activity, such as walking and running, has also been achieved. Geolocations of labeled entities are determined from their image coordinates using either wide-baseline stereo from two or more overlapping camera views, or intersection of viewing rays with a terrain model from monocular views. These computed locations feed into a higher level tracking module that tasks multiple sensors with variable pan, tilt and zoom to cooperatively and continuously track an object through the scene. All resulting object hypotheses from all sensors are transmitted as symbolic data packets back to a central operator control unit, where they are displayed on a graphical user interface to give a broad overview of scene activities. These technologies have been demonstrated through a series of yearly demos, using a testbed system developed on the urban campus of CMU.Detection of moving objects in video streams is known to be a significant, and difficult, research problem. Aside from the intrinsic usefulness of being able to segment video streams into moving and background components, detecting moving blobs provides a focus of attention for recognition, classification, and activity analysis, making these later processes more efficient since only “moving” pixels need be considered.There are three conventional approaches to moving object detection: temporal differencing ; background subtraction; and optical flow. Temporal differencing is very adaptive to dynamic environments, but generally does a poor job of extracting allrelevant feature pixels. Background subtraction provides the most complete feature data, but is extremely sensitive to dynamic scene changes due to lighting and extraneous events. Optical flow can be used to detect independently moving objects in the presence of camera motion; however, most optical flow computation methods are computationally complex, and cannot be applied to full-frame video streams in real-time without specialized hardware.Under the VSAM program, CMU has developed and implemented three methods for moving object detection on the VSAM testbed. The first is a combination of adaptive background subtraction and three-frame differencing . This hybrid algorithm is very fast, and surprisingly effective – indeed, it is the primary algorithm used by the majority of the SPUs in the VSAM system. In addition, two new prototype algorithms have been developed to address shortcomings of this standard approach. First, a mechanism for maintaining temporal object layers is developed to allow greater disambiguation of moving objects that stop for a while, are occluded by other objects, and that then resume motion. One limitation that affects both this method and the standard algorithm is that they only work for static cameras, or in a ”stepand stare” mode for pan-tilt cameras. To overcome this limitation, a second extension has beendeveloped to allow background subtraction from a continuously panning and tilting camera . Through clever accumulation of image evidence, this algorithm can be implemented in real-time on a conventional PC platform. A fourth approach to moving object detection from a moving airborne platform has also been developed, under a subcontract to the Sarnoff Corporation. This approach is based on image stabilization using special video processing hardware.The current VSAM IFD testbed system and suite of video understanding technologies are the end result of a three-year, evolutionary process. Impetus for this evolution was provided by a series of yearly demonstrations. The following tables provide a succinct synopsis of the progress made during the last three years in the areas of video understanding technology, VSAM testbed architecture, sensor control algorithms, and degree of user interaction. Although the program is over now, the VSAM IFD testbed continues to provide a valuable resource for the development and testing of new video understanding capabilities. Future work will be directed towards achieving the following goals:1. better understanding of human motion, including segmentation and tracking ofarticulated body parts;2.improved data logging and retrieval mechanisms to support 24/7 systemoperations;3.bootstrapping functional site models through passive observation of sceneactivities;4.better detection and classification of multi-agent events and activities;5.better camera control to enable smooth object tracking at high zoom; and6.acquisition and selection of “best views” with the eventual goal of recognizingindividuals in the scene.远程视频监控系统在美国国防部高级研究计划局,视频监控系统项目下进行的一系列监控装置研究是一项合作性的多层传感监控,用以支持战场决策。

相关文档
最新文档